Database Security/Privacy and Social Networking Alex Mack Table of Contents Data Security How to secure a database API Privacy protection for social networking APIs De-anonymizing social networks Fly-by Night: Mitigating the privacy risks of social networking

Copyright Complaint Adult Content Flag as Inappropriate

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.

Download Presentation

PowerPoint Slideshow about 'Database Security/Privacy and Social Networking' - Audrey

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

Enable Security Controls: Make sure to check the security controls and enable all of the security features before allowing anyone access

Check the Patch Level: Perform a full assessment of the database to fix any existing vulnerabilities in the system

Exclude Copying of the Database: The chief IT administrator of the database, has no control over the data once the database has been copied, so database copying should be excluded as it poses an internal threat to security

Work has been done on the problem of preserving statistical characteristics of data sets without revealing the unique identity of database members.

Selective private function evaluation is a specific instance of secure function evaluation, in which a client wishes to compute some function over a server’s data set, but neither party should learn more than the response

This might be useful for large-scale studies of properties of a social network, but does not provide the information needed for applications.

Operators of online social networks are increasingly sharing potentially sensitive information about users and their relationships with advertisers, application developers, and data-mining researchers.

Privacy is typically protected by anonymization, which is removing names, addresses, etc. A new de-anonymization algorithm is used to analyzing privacy and anonymity in social networks.

The algorithm is based purely on the network topology, does not require creation of a large number of dummy "sybil" nodes, is robust to noise and all existing defenses, and works even when the overlap between the target network and the adversary's auxiliary information is small.

In conclusion, databases and social networks are protected by several methods such as encryption, user authentication, backup solutions, etc. Though there is room for error during the process of security, programmers are working efficiently with network servers to make sure that a user’s privacy is a not at risk of being compromised.